0% found this document useful (0 votes)
0 views

CH1

Chapter 1 contains multiple-choice and true/false questions related to computer functions, components, and networking concepts. It covers topics such as CPU, storage types, network protocols, and the differences between network types like LAN and WAN. Additionally, it includes questions about the boot procedure, device drivers, and network communication processes.

Uploaded by

karammorkos98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

CH1

Chapter 1 contains multiple-choice and true/false questions related to computer functions, components, and networking concepts. It covers topics such as CPU, storage types, network protocols, and the differences between network types like LAN and WAN. Additionally, it includes questions about the boot procedure, device drivers, and network communication processes.

Uploaded by

karammorkos98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 13

Chapter 1

Chapter 1

Multiple Choice
1. Which of the following is one of the three basic functions a
computer performs? (Choose three.)
a. Processing
b. Internet access
c. Input
d. Graphics
e. Output
f. E-mail
2. Which computer component executes instructions provided by
computer programs?
a. CPU
b. NIC
c. Hard drive
d. USB
3. What do you call each of the processors inside a CPU?
a. I/O
b. Core
c. OS
d. Flash
4. Which of the following is considered long-term storage? (Choose
two.)
a. USB or flash drive
b. RAM
c. Working storage
d. Hard drive
5. Which motherboard component controls data transfers between
memory, expansion slots, I/O devices, and the CPU?
a. RAM slots
b. IDE connectors
c. Chipset
d. PCI Express
6. You want to purchase a high-performance graphics card for your
computer. Which type of connector should it have?
a. PCI
b. SATA
c. IDE
d. PCI Express
Chapter 1

7. What is the term for the time it takes for read/write heads to move
to the correct spot on the hard disk platter?
a. Rotational delay
b. Seek time
c. Transfer time
d. Access time
8. Which of the following is a task usually performed by the
firmware? (Choose two.)
a. Perform a POST.
b. Create an interrupt.
c. Store the operating system.
d. Begin the boot procedure.
9. Which of the following is the correct order of the steps of the boot
procedure?
1. The OS is loaded into RAM.
2. CPU starts.
3. OS services are started.
4. Power is applied.
5. The POST is executed.
6. Boot devices are searched.
a. 2, 4, 6, 1, 3, 5
b. 1, 5, 2, 4, 3, 6
c. 4, 2, 5, 6, 1, 3
d. 5, 4, 1, 3, 2, 6
Chapter 1

10.You have just installed a new NIC in your PC to replace the old
one that had started malfunctioning. What additional software must
be installed to allow the OS to communicate with the new NIC?
a. Network application
b. Device driver
c. BIOS
d. Protocol
11.Which of the following requests information stored on another
computer?
a. NIC
b. Network client
c. Network server
d. Network protocol
e. Device driver
12.Choose the correct order for the process of a user attempting to
access network resources:
1. Network protocol
2. Application
3. Network client
4. NIC driver
a. 4, 2, 1, 3
b. 3, 2, 1, 4
c. 1, 4, 2, 3
d. 2, 3, 1, 4
e. 3, 1, 2, 4
13.TCP/IP is an example of which of the following?
a. NIC
b. Network client
c. Network server
d. Network protocol
e. Device driver
Chapter 1

14.In network communication, what type of address is used to deliver


a frame to the correct computer on the network? (Choose two.)
a. MAC
b. Logical
c. IP
d. Physical
15.What type of message is used to determine whether a computer is
listening on the network?
a. MAC
b. Ping
c. IP
d. TCP
16.What does TCP/IP use to look up a computer’s IP address, given
its name?
a. DNS
b. Ping
c. MAC
d. TCP
17.What is the unit of information containing MAC addresses and an
error-checking code that’s processed by the network interface
layer?
a. Packet
b. Ping
c. Frame
d. Chunk
18.Data is processed from the time an application creates it to the time
it reaches the network medium. This process includes adding
information such as addresses and is called which of the
following?
a. Packetization
b. Encapsulation
c. Deencapsulation
d. Layering
Chapter 1

19.You’re the network administrator for a company that has just


expanded from one floor to two floors of a large building, and the
number of workstations you need has doubled from 50 to 100.
You’re concerned that network performance will suffer if you add
computers to the existing LAN. In addition, new users will be
working in a separate business unit, and there are reasons to
logically separate the two groups of computers. What type of
network should you configure?
a. WAN
b. MAN
c. Internetwork
d. Extended LAN
20.Which of the following best describes a client?
a. A computer’s primary role in the network is to give other
computers access to network resources and services.
b. A computer’s primary role in the network is to run user
applications and access network resources.
c. It’s the software that responds to requests for network
resources.
d. The OS installed on a computer is designed mainly to share
network resources.
21.You work for a small company with four users who need to share
information on their computers. The budget is tight, so the network
must be as inexpensive as possible. What type of network should
you install?
a. Server-based network
b. Peer-to-peer network
c. Wide area network
d. Storage area network
22.Which of the following characteristics is associated with a peer-to-
peer network? (Choose three.)
a. Decentralized data storage
b. Inexpensive
c. User-managed resources
d. Centralized control
e. Uses a directory service
Chapter 1

23.A device interconnects five computers and a printer in a single


office so that users can share the printer. This configuration is an
example of which of the following?
a. LAN
b. MAN
c. WAN
d. Internetwork
24.A company has just made an agreement with another organization
to share their two networks’ resources by using TCP/IP protocols.
What best describes this arrangement?
a. MAN
b. LAN
c. Intranet
d. Extranet
25.You have installed Windows Server on a new server and want to
centralize user logons and security policies. What type of software
should you install and configure on this server?
a. Naming services
b. Application services
c. Communication services
d. Directory services
26.A network interface can transfer data at 1 Gbps. Approximately
how many bytes can the interface transfer per second?
a. 1 billion
b. 125 million
c. 100,000
d. 8 billion
True / False

1. A network that connects LANs in different countries is most likely a WAN.


a. True
b. False

2. In order to find out your MAC address, you should open a command prompt and
type ipconfig /all.
a. True
b. False

3. What makes a computer a "server" is the fact that it has a server operating
system installed on it.
a. True
Chapter 1

b. False

4. Each component of a computer is designed to perform only one specific task-


either input, processing, or output.
a. True
b. False

5. An extranet is a private network, such as a school or company network, in which


the devices and servers are available only to users connected to the internal
network.
a. True
b. False

Multiple Choice

6. The XYZ company has two offices, one in Chicago, and a brand new office in
Pittsburgh. To connect the two offices, they will need a dedicated line, probably
leased from the phone company. What type of network will they be implementing
to connect their two offices?
a. LAN
b. WAN
c. PAN
d. SAN

7. Air waves are an example of what type of network component?


a. network interface card
b. network medium
c. interconnecting device
d. network protocol

8. Windows 10 is an example of which of the following?


a. network protocol
b. client operating system
c. server software
Chapter 1

d. server operating system

9. What is one of the disadvantages of a peer-to-peer network compared to a


server-based network?
a. more difficult to setup and
install
b. more expensive
c. higher administration costs
d. limited security

10. What command would you issue from a command prompt to see a listing of the
computers in your workgroup?
a. arp -a
b. net view
c. ipconfig /all
d. ping

11. What is one of the disadvantages of a server-based network compared to a


peer-to-peer network?
a. additional costs
b. decentralized data
access
c. difficult to expand
d. less secure

12. Which component manages the details of communicating with the NIC
hardware to send and receive data to and from network media?
a. client
b. server software
c. network protocol
d. device driver

13. When data is being prepared for transmission onto the network, it is broken
into small pieces and a header and trailer are added to each piece to help identify it.
What is this process called?
Chapter 1

a. multitasking
b. verification
c. encapsulation
d. application

14. Every NIC has a unique address that consists of a 12-digit hexadecimal value.
What is this address called?
a. IP address
b. subnet mask
c. MAC address
d. default gateway

15. Using the physical mail analogy, what part of an address on an envelope is
most like the IP address?
a. MAC address
b. street address
c. recipient
name
d. zip code

16. You are building a gaming computer and you want to install a dedicated
graphics card that has a fast GPU and 4GB of memory on board. You need to make
sure that you have the right connector available on your motherboard. What type of
connector would be appropriate?
a. PCI
b. SATA
c. PCI Express
d. IDE

17. You want a fast CPU for the new computer you are building and your
Chapter 1

motherboard only has one CPU socket. To increase the processing power, you
need a CPU that provides more than one processor. What type of CPU are you
looking for?
a. multicore
b. multiprocessing
c. multitasking
d. multilink

18. Which component, located on the motherboard, carries out all the instructions
provided by computer programs?
a. hard drive
b. RAM
c. NIC
d. CPU

19. You are the network administrator for a company and you want to separate the
traffic from the accounting department from the rest of the network. However, the
accounting department still needs to have access to other network resources. What
type of network do you need to implement?
a. WPAN
b. internetwork
c. WAN
d. wireless network

20. Which part of the network communication process is responsible for sending
and receiving data to and from the network media?
a. network software
b. network protocol
c. user application
d. network interface

21. You're the network administrator for a company located in Arizona that has
just opened an office in Texas. You need to make sure that the two locations can
communicate. What type of network are you implementing?
a. MAN
Chapter 1

b. WAN
c. internetwork
d. extended LAN

22. You have just started a new business. You need to have three to four
workstations available for your employees who simply need to share some files
and a printer, but you don't have a large budget. Security is not a major concern,
but costs are. Which network model would be the most appropriate for your
situation?
a. internetwork
b. domain
c. peer-to-peer network
d. server-based network

23. Which unit of data stores a single value that can be a 0 or a 1?


a. byte
b. bit
c. nibble
d. word
e. bps

Multiple Response

24. Which of the following are examples of output devices? (Choose all that
apply.)
a. monitor
b. printer
c. keyboard
d. speakers
e. CPU

25. Which of the following are examples of input devices? (Choose all that apply.)
a. mouse
b. monitor
c. keyboard
d. scanner
Chapter 1

e. printer

Completion

26. The three basic functions of a computer are input, ____________, and output.

27. A ____________ is a packet that has been encapsulated with the source and
destination MAC addresses in the header and an error-checking code in the trailer.

28. A ____________ is a chunk of data with the source and destination IP


addresses added to it.

29. A ______________ is a collection of users and computers whose accounts are


managed by Windows servers called domain controllers.

30. The process of ____________ adds IP addresses and then MAC addresses to
chunks of data before sending the data onto the network.

Matching

Match each item with a statement below.


a. server
b. network protocols
c. domain
d. LAN
e. header
f. packet
g. WAN
h. nonvolatile
memory
i. internetwork
j. core
Chapter 1

31. the term used to describe an OS designed mainly to share network resources

32. the software defining the rules and formats a computer must use when sending
information across the network

33. a collection of users and computers in a Windows server-based network

34. a network that connects devices in a small geographic area

35. information added to the front end of a chunk of data

36. a chunk of data with source and destination IP addresses in the header

37. network that is geographically dispersed

38. the firmware of a computer is stored in this type of storage

39. a networked collection of LANs tied together by devices such as routers

40. an instance of a processor inside a single CPU chip

You might also like